The Complete Ethical Hacking Course for 2016/2017!

4.7 (3279)
MOOC
Payment
Learning paid
Language
English
Duration
16 hours course
Course by Udemy
$ 126.99
$ 126.99
What will you learn?
Get started using Fedora (Linux)
Understand the basics of terminal
Troubleshoot networks using Wireshark
Stay anonymous online
Set up a VPN server
Hack wireless networks
Crack passwords and encryption using HashCat
Clone websites
Protect & defend your own network
Learn how to deploy a keylogger from a USB: Works out of the box for Windows 7 8 8.1 and 10
About the course

If you want to get started as an ethical hacker, learn how network security professionals protect their systems, or take your IT career to the next level you are going to LOVE this course! This course is a sequel to The Complete Ethical Hacking Course: Beginner to Advanced! which over 50,000 students have taken, and was at one point the most popular ethical hacking course in the world! Join us now and receive over 80 lectures & 15 hours of HD video, and 1 on 1 assistance from experienced network security professionals! We will cover the following topics in this course:

  • Introduction to ethical hacking
  • Linux installation, terminal basics, and Wireshark Setup
  • Staying anonymous online, proxy servers, and accessing the dark side of the internet using TOR
  • Aircrack-ng, HashCat, and wifi hacking
  • Defending your own networks from attacks
  • Cloning websites
  • Arduino USB keylogger that works out of the box for Windows 7, 8, 8.1, and 10
  • Windows power shell scripting

This course will receive monthly updates based on students requests, and our goal is to make this the #1 network security course online!

DISCLAIMER The attacks demonstrated in this course can cause serious damage and are only shown for educational purposes. The intent of this course is to give you the tools to defend your own networks, share skills that are valuable to companies all over the world, and help you to better understand the challenges that information security professionals face on a daily basis.

English & Spanish subtitles available.

Thank you for taking the time to read this, and we hope to see you in the course!

Program
Introduction
Introduction
What you can expect to learn in this course and hardware & software requirements.
Setup
Create a USB for Installation
Explains how to set up the environment.
Installation Procedure Part 1
Guides you through the process of Linux installation.
Installation Procedure Part 2
Guides you through the process of Linux installation.
Improve Safety and Anonymity of your Browser
General browser configuration.
Fedora KDE Desktop Orientation (optional)
Getting acquainted in Fedora KDE Desktop.
Terminal Basics Part 1
Showing basic Linux commands.
Terminal Basics Part 2
Showing basic Linux commands.
Wireshark Setup Part 1
Setting up Wireshark and configuring it for later usage.
Wireshark Setup Part 2
Setting up Wireshark and configuring it for later usage.
Requirements
  • A computer to follow along with exercises in the course
  • USB drive to install Linux
  • Wireless card & router access
  • Various programs used to demo attacks (FREE)
  • An eager mind!
Lecturers
Ermin Kreponic
Ermin Kreponic
IT Expert
Platform
/storage/img/providers/udemy.svg
Udemy courses are suited to professional development. The platform is organized in such a way that it is experts themselves that decide the topic and when the course will start. All supporting documents are made available to you for lifetime access. On this platform, you can find a course on about any subject, and that is no exaggeration – from a tutorial on how to ride a motorcycle, to managing the financial markets. The language and the course format are established by the teacher. This is why it is important to read the information about the course carefully before parting with any money.
Rating
4.7
(1681)
(982)
(421)
(117)
(80)
Comments (3279)
Like any other website, konevy uses «cookies». These cookies are used to store information including visitor's preferences, and the pages on the website that the visitor accessed or visited. The information is used to optimize the users' experience by customizing our web page content based on visitors' browser type and/or other information. For more general information on cookies, please read the «What Are Cookies» article on Cookie Consent website.